-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-a93c06a1d9 2023-11-04 03:45:00.543203 -------------------------------------------------------------------------------- Name : usd Product : Fedora 37 Version : 22.05b Release : 28.fc37 URL : http://www.openusd.org/ Summary : 3D VFX pipeline interchange file format Description : Universal Scene Description (USD) is a time-sampled scene description for interchange between graphics applications. -------------------------------------------------------------------------------- Update Information: Security fix for CVE-2023-45661 CVE-2023-45662 CVE-2023-45663 CVE-2023-45664 CVE-2023-45666 CVE-2023-45667 CVE-2023-45675 CVE-2023-43281 -------------------------------------------------------------------------------- ChangeLog: * Thu Oct 26 2023 Benjamin A. Beasley <code@xxxxxxxxxxxxxxxxxx> - 22.05b-28 - Ensure stb_image contains the latest CVE patches * Thu Oct 26 2023 Benjamin A. Beasley <code@xxxxxxxxxxxxxxxxxx> - 22.05b-27 - Add versioned Requires on usd-libs from python3-usd * Thu Oct 26 2023 Benjamin A. Beasley <code@xxxxxxxxxxxxxxxxxx> - 22.05b-26 - Update License to SPDX -------------------------------------------------------------------------------- References: [ 1 ] Bug #2246102 - CVE-2023-45661 stb: out of bounds read https://bugzilla.redhat.com/show_bug.cgi?id=2246102 [ 2 ] Bug #2246103 - CVE-2023-45662 stb: out of bounds read https://bugzilla.redhat.com/show_bug.cgi?id=2246103 [ 3 ] Bug #2246104 - CVE-2023-45663 stb: memory access violations https://bugzilla.redhat.com/show_bug.cgi?id=2246104 [ 4 ] Bug #2246105 - CVE-2023-45664 stb: memory access violations https://bugzilla.redhat.com/show_bug.cgi?id=2246105 [ 5 ] Bug #2246109 - CVE-2023-45666 stb: memory access violation https://bugzilla.redhat.com/show_bug.cgi?id=2246109 [ 6 ] Bug #2246110 - CVE-2023-45667 stb: memory access violation https://bugzilla.redhat.com/show_bug.cgi?id=2246110 [ 7 ] Bug #2246320 - CVE-2023-43281 stb: remote denial of service https://bugzilla.redhat.com/show_bug.cgi?id=2246320 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-a93c06a1d9' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue